Friday, September 27, 2013

One Citizen Speaking...



OBAMACARE: THE SENATE VOTE THAT WILL DEFINE WHO IS A REPUBLICAN HARRY REID NEEDS 6 REPUBLICANS TO VOTE WITH HIM TO FUND OBAMACARE!

Posted: 26 Sep 2013 10:00 PM PDT

The vote for “cloture” to limit debate, if it passes, will give Senate Majority Leader Harry Reid the power to fund Obamacare. It is an easy vote to understand. Harry Reid will vote “for” cloture and any Republican that joins him is voting with the progressive socialist democrats to fund Obamacare.

Capture7-22-2009-11.10.07 PM

If not now, when? The time for talking an campaigning is over. This is a showdown vote.

All 46 Republicans in the Senate ran on the issue of defunding or limiting the damage of Obamacare. It was all talk with “zero” consequences. Tomorrow's vote is the real deal. Anyone who votes for “cloture” will be voting with Harry Reid and the progressive socialist democrats who are destroying America from within.

Capture6-16-2009-12.54.14 AM

Squishy RINOs (Republicans In Name Only) like John McCain, Lindsey Graham, Mitch McConnell, John Cornyn, Saxby Chambliss, Johnny Isakson, Dan Coats, Roy Blunt, Tom Coburn, Bob Corker, Orin Hatch are all thought to be voting with Harry Reid and the progressive socialist democrats to fund Obamacare and make it harder for this Obamanation to be brought under control.

Capture6-16-2009-12.52.53 AM

Some Republicans believe that Obamacare should be funded and allowed to collapse under its own weight – after hurting millions of Americans and losing thousands of jobs. Others want to simply vote “present” so that they have no record for which they can be held accountable. An old Obama trick used in the Illinois Senate to avoid having to take a stance on difficult subjects.

Capture

Bottom line …

This is one of those defining moments. If the Northeastern Liberal Elites in the Republican Party are satisfied with stealing their portion of the pork, and are unwilling to protect the Americans that count on these representatives to protect them from stunningly bad legislation, they should be thrown out of office at the earliest possible time. They should be publicly shamed and humiliated for violating their oath of office and funding a grossly unconstitutional act.

Capture2-20-2009-8.30.27 PM

-- steve

CAN CLOUD PRODUCTS BE TRUSTED IN THE ENTERPRISE OR FOR ENTREPRENEURIAL PROJECTS?

Posted: 26 Sep 2013 07:17 PM PDT

It appears that the latest version of Google's Chrome released on the development channel can easily and seamlessly exist on top of an existing operating system to bring the Chrome experience to enterprise and entrepreneurial users at minimal implementation cost.

But given the recent NSA revelations of government access and spying using the facilities of major hardware and software vendors, I question the security aspect of running any additional software that stores data on unknown third-party servers and that is being made available under a unilateral terms of service/privacy contract that appears to provide little or no legal protection for the intellectual property of the user that might be disclosed by third-party monitoring of the communications stream or documents uploaded, downloaded or processed by a cloud-based vendor.

So, unless there are legal safeguards to protect and safeguard private, confidential, or proprietary information – along with substantial remedies for unauthorized access and disclosure, the idea of expanding my development activities to the cloud remain somewhat doubtful.

Yes, there are many benefits for both the enterprise and entrepreneurs when it comes to lowering the cost of entry and improving collaborative activities. But, at what price? With the current United States Patent System conferring preference on the first person to file, rather than the first person to reduce an invention to practice, anyone or any corporation monitoring the development of new ideas could, at this point in time, theoretically, beat an inventor to a patent – and should that party have more legal talent and funding than the inventor – it would be no contest; and the invention is lost to the corrupt individual or corporation. Lest you believe that this is an impossibility, one might consider that both industrial espionage and state-sponsored industrial espionage has been increasing over the past few decades.

And, there is a vested interest in a government being able to monitor developments in key industrial, electronic, and software fields that have an impact on national security. With some of these systems, it is like the government has a two-way connection into your home, office, and life. Given that the United States government has allegedly tried to subvert strong encryption on Internet-related communications, one must take precautions against both rogue agents and rogue governments. It would not be the first time that a relatively low-paid government agent with the “keys to the kingdom” has violated their oath of office and fiduciary duties to provide information to foreign sovereign governments, government contractors, corporations, and individuals for personal and/or ideological self-benefits.

The alternative model is to reduce collaboration to a bare minimum of people, and to insure that the development effort is compartmentalized. While there is a corresponding loss of creativity and security, there may be an offsetting gain of protecting your intellectual property.

Bottom line …

Until the laws regarding the access, storage, dissemination, and usage of digital properties are upgraded, cloud-based operations appear to make individuals, corporations, and nations more vulnerable to evildoers and malicious political parties.

There is also the possibility that key software components ("apps") used to facilitate your projects or communications can be easily withdrawn from the marketplace by those who control their own "app stores."  Many plug-ins will may be obsoleted, like those based on older APIs (Application Programming Interfaces) or those that are perceived to present unacceptable security issues like Adobe Flash and other similar plug-ins.

And, let us not forget the inherent security risk of using xml-based data structures where each data element is clearly tagged -- sometimes to the point where the known tag structure and repetition migh provide insights that can be use to compromise encrypted communications.

Just saying – before you accept that free offer of software or services in return for scanning your communications to serve targeted advertising or improve the “user experience,” beware of the risks involved and implement prudent methods to mitigate those risks.

-- steve

BLACKS CALLING OUT THE PROGRESSIVE SOCIALIST DEMOCRATS AND THEIR ATTACK ON THE NRA

Posted: 26 Sep 2013 07:15 PM PDT

This is probably one of the best videos that has been made that actually calls out the democrats for their evilness … especially pointing out that the NRA was founded to help blacks obtain weapons to fight the democrat-inspired, democrat-led KKK … 

Bottom line …

Keeping it real!

-- steve

No comments:

Post a Comment

Featured Post

RT @anti_commie32: Keep up the great work!!! https://t.co/FIAnl1hxwG

RT @anti_commie32: Keep up the great work!!! https://t.co/FIAnl1hxwG — Joseph Moran (@JMM7156) May 2, 2023 from Twitter https://twitter....